monkey/infection_monkey
Vakaris eae3f3440d Refactored exploit_host and added get_exploit_config 2018-08-22 13:33:36 +03:00
..
exploit Refactored exploit_host and added get_exploit_config 2018-08-22 13:33:36 +03:00
model Notes fixed v.2 2018-08-15 16:01:27 +03:00
monkey_utils/sambacry_monkey_runner rename chaos_monkey folder to infection_monkey 2018-02-19 11:35:34 +02:00
network Fixed half of the notes and added a small tcp_port_to_service method in network/tools 2018-08-09 12:13:44 +03:00
system_info Merge branch 'develop' into SSH_key_stealing 2018-06-05 16:59:28 +03:00
transport Notes fixed v.2 2018-08-15 16:01:27 +03:00
build_linux.sh rename chaos_monkey folder to infection_monkey 2018-02-19 11:35:34 +02:00
build_windows.bat rename chaos_monkey folder to infection_monkey 2018-02-19 11:35:34 +02:00
config.py Merge branch 'develop' into master 2018-07-09 18:53:43 +03:00
control.py Merge branch 'develop' into bugfix/upgrade-windows-32-to-64 2018-04-11 19:21:52 +03:00
dropper.py Changed to a better file comparison function 2018-07-18 20:48:15 +03:00
example.conf Merge branch 'develop' into master 2018-07-09 18:53:43 +03:00
main.py Fix race-condition bug on upgrade 2018-04-11 20:59:23 +03:00
monkey-linux.spec Move range to common code folder 2018-02-26 18:39:49 +02:00
monkey.ico Update icons 2018-02-27 19:39:32 +02:00
monkey.py from six import string_types, text_type, xrange (#128) 2018-05-22 11:13:18 +03:00
monkey.spec Move range to common code folder 2018-02-26 18:39:49 +02:00
monkeyfs.py rename chaos_monkey folder to infection_monkey 2018-02-19 11:35:34 +02:00
readme.txt rename chaos_monkey folder to infection_monkey 2018-02-19 11:35:34 +02:00
requirements.txt Remove Monkey testing code, dead code as it is. 2018-05-23 15:22:27 +03:00
system_singleton.py rename chaos_monkey folder to infection_monkey 2018-02-19 11:35:34 +02:00
tunnel.py rename chaos_monkey folder to infection_monkey 2018-02-19 11:35:34 +02:00
utils.py Rename check for 64-bit to make explict it's a windows only check 2018-04-12 17:57:21 +03:00
windows_upgrader.py Bugfix when upgrading the monkey without admin permissions. 2018-04-17 11:27:35 +03:00

readme.txt

How to build a monkey binary from scratch.

The monkey is composed of three separate parts.
* The Infection Monkey itself - PyInstaller compressed python archives
* Sambacry binaries - Two linux binaries, 32/64 bit.
* Mimikatz binaries - Two windows binaries, 32/64 bit.

--- Windows ---

1. Install python 2.7. Preferably you should use ActiveState Python which includes pywin32 built in. 
    You must use an up to date version, at least version 2.7.10
    https://www.python.org/download/releases/2.7/
2.	Install pywin32 (if you didn't install ActiveState Python)
	Install pywin32, minimum build 219
		http://sourceforge.net/projects/pywin32/files/pywin32
3.	Add python directories to PATH environment variable (if you didn't install ActiveState Python)
	a. Run the following command on a cmd console (Replace C:\Python27 with your python directory if it's different)
		setx /M PATH "%PATH%;C:\Python27;C:\Pytohn27\Scripts
	b. Close the console, make sure you execute all commands in a new cmd console from now on.
4.	Install pip
	a. Download and run the pip installer
	https://bootstrap.pypa.io/get-pip.py
5.	Install further dependencies
	a. install VCForPython27.msi
		https://aka.ms/vcpython27
	b. if not installed, install Microsoft Visual C++ 2010 SP1 Redistributable Package
		32bit: http://www.microsoft.com/en-us/download/details.aspx?id=8328
		64bit: http://www.microsoft.com/en-us/download/details.aspx?id=13523
6.	Download the dependent python packages using 
		pip install -r requirements.txt
7.	Download and extract UPX binary to [source-path]\monkey\infection_monkey\bin\upx.exe:
		https://github.com/upx/upx/releases/download/v3.94/upx394w.zip
8.	Build/Download Sambacry and Mimikatz binaries
	a. Build/Download according to sections at the end of this readme.
	b. Place the binaries under [code location]\infection_monkey\bin
9.	To build the final exe:
		cd [code location]/infection_monkey
		build_windows.bat 
		output is placed under dist\monkey.exe

--- Linux ---

Tested on Ubuntu 16.04 and 17.04.

1.	Install dependencies by running:
		sudo apt-get update
		sudo apt-get install python-pip python-dev libffi-dev upx libssl-dev libc++1
    Install the python packages listed in requirements.txt using pip
        cd [code location]/infection_monkey
		pip install -r requirements.txt
2.	Build Sambacry binaries
	a. Build/Download according to sections at the end of this readme.
	b. Place the binaries under [code location]\infection_monkey\bin
3.	To build, run in terminal:
		cd [code location]/infection_monkey
		chmod +x build_linux.sh
		./build_linux.sh
	output is placed under dist/monkey

-- Sambacry --

Sambacry requires two standalone binaries to execute remotely.
1.	Install gcc-multilib if it's not installed
	sudo apt-get install gcc-multilib
2.	Build the binaries
	cd [code location]/infection_monkey/monkey_utils/sambacry_monkey_runner
	./build.sh

-- Mimikatz --

Mimikatz is required for the Monkey to be able to steal credentials on Windows. It's possible to either compile from sources (requires Visual Studio 2013 and up) or download the binaries from 
https://github.com/guardicore/mimikatz/releases/tag/1.0.0
Download both 32 and 64 bit DLLs and place them under [code location]\infection_monkey\bin